0% found this document useful (0 votes)
9 views32 pages

IP Services

The document outlines a comprehensive CCNA training course covering key networking technologies such as DHCP, DNS, NAT, device management protocols, and Quality of Service (QoS). It explains the functions and configurations of each protocol, including how DHCP automates IP address assignment, DNS translates domain names to IP addresses, and NAT allows multiple devices to share a single public IP address. Additionally, it discusses device management protocols like SNMP and Syslog, and the importance of QoS in managing network traffic for optimal performance.

Uploaded by

Habtamu Asayto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views32 pages

IP Services

The document outlines a comprehensive CCNA training course covering key networking technologies such as DHCP, DNS, NAT, device management protocols, and Quality of Service (QoS). It explains the functions and configurations of each protocol, including how DHCP automates IP address assignment, DNS translates domain names to IP addresses, and NAT allows multiple devices to share a single public IP address. Additionally, it discusses device management protocols like SNMP and Syslog, and the importance of QoS in managing network traffic for optimal performance.

Uploaded by

Habtamu Asayto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

CISCO

CCNA
TRAINING
A comprehensive course on networking technologies
Prepared By
Habtamu Asayto
PRESENTATION OUTLINES
DHCP (Dynamic Host Configuration
Protocol)

DNS (Domain Name System)

NAT (Network Address Translation)

IP
Device Management Protocols
Services

QoS

06/09/2025 2
DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)

 In IP environment, before a computer can communicate to another one,

they need to have their own IP addresses. There are two ways of
configuring an IP address on a device:

1. Statically assign an IP address. This means we manually type an IP


address for this computer

2. Use a protocol so that the computer can obtain its IP address


automatically (dynamically) DHCP.

06/09/2025
3
DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)

 Is a network protocol that automates IP address assignment, reducing the

need for manual configuration. It allows devices to obtain:


 IP address

 Subnet mask

 Default gateway

 DNS server

 Other network settings

06/09/2025
4
DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)
How DHCP Works

Discover
Client broadcasts to find available DHCP servers.

Offer
Server responds with IP address and lease details.

Request
Client requests the offered IP address from the server.

Acknowledge
Server confirms and assigns the IP to the client.

06/09/2025
5
DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)
When a DHCP address conflict occurs

 During the IP assignment process, the DHCP Server uses ping to test the availability

of an IP before issuing it to the client. If no one replies then the DHCP Server believes
that IP has not been allocated and it can safely assign that IP to a client. If someone
answers the ping, the DHCP Server records a conflict, the address is then removed
from the DHCP pool and it will not be assigned to a client until the administrator
resolves the conflict manually. 06/09/2025
6
DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL)
Configuring a DHCP Server

Step 4:
Activate the
DHCP Server
Step 3: Set
DHCP Options Enable the
2: Configure
Lease server to start
Step 1: Set IP Duration Include settings
distributing IP
Address Pool Specify how long like default
addresses to
Define the range clients can keep gateway, subnet
network
of IP addresses an IP address mask, and DNS
before renewal is devices.
the DHCP server servers for
can assign to required. clients.
clients.
06/09/2025
7
DHCP CONFIGURATION

Configuration
06/09/2025
8
DNS (DOMAIN NAME SYSTEM)
DNS

 Is a hierarchical and decentralized system that translates human-readable

domain names (like www.google.com) into IP addresses (like


142.250.64.78), which are used by devices to locate and communicate
with each other on networks.

Why DNS is Important in Networking


 People remember names (e.g., www.cisco.com), not IPs.

 Computers need IPs to establish communication.

 DNS acts like a phone book or contact list for the internet.

06/09/2025
9
DNS (DOMAIN NAME SYSTEM)
DNS Components

DNS Client (Resolver) Root Servers


 Initiates DNS queries to resolve  Top-level DNS servers directing
domain names into IP addresses. queries to TLD servers.
 Usually integrated in the user's  Operate a global, distributed
operating system or application. network ensuring resilience and

TLD Servers speed.


Authoritative Name Servers
 Manage domains under each top- Store DNS records and provide final
level domain (e.g., .com, .org). answers for domain queries.
 Help route requests towards Critical for DNS resolution and caching
authoritative servers responsible for authoritative data.
specific domains.

06/09/2025
1
DNS (DOMAIN NAME SYSTEM)

DNS in Cisco Routers


R1(config)# ip domain-lookup

R1(config)# ip name-server 8.8.8.8

Troubleshoot by
R1# ping www.cisco.com

If ip domain-lookup is disabled, DNS lookups won’t work. Then disable it by:

R1(config)# no ip domain-lookup

06/09/2025
1
NAT (NETWORK ADDRESS TRANSLATION)
 Network Address Translation (NAT) is a method used in routers to modify IP

addresses in packet headers as they pass through, allowing multiple


devices in a private network to access the internet using a single public IP
address.

NAT helps with:


 Conserving IPv4 addresses
 Enhancing security by masking internal IPs
 Enabling private networks to communicate with external networks

06/09/2025
1
NAT (NETWORK ADDRESS TRANSLATION)
 There are 3 types of NAT translation

1. Static NAT: Designed to allow one-to-one mapping between local and


global addresses. This flavor requires you to have one real Internet IP
address for every host on your network.
 Used when a device needs a permanent public IP (e.g., a web server)

 Example: 192.168.1.10 ⇔ 203.0.113.10

2. Dynamic NAT (Maps a private IP to an available public IP from a pool)


 Useful when multiple private addresses need public IPs temporarily

 One-to-one, but dynamically assigned from a pool.

 Example: 192.168.1.10 → 203.0.113.100, 192.168.1.11 → 203.0.113.101

06/09/2025
1
NAT (NETWORK ADDRESS TRANSLATION)
3. PAT (Port Address Translation)

 Maps multiple private IP addresses to a single public IP using different ports.

 Many-to-one

 usually uses just one public IP.

 Most common in home and small business networks. Ideal when there's only one or

a few public IPs available.

06/09/2025
1
NAT (NETWORK ADDRESS TRANSLATION)
NAT terms:

 Inside local address – The IP address assigned to a host on the inside network.

The address is usually not an IP address assigned by the Internet Network


Information Center (InterNIC) or service provider.

 Inside global address – A legitimate IP address assigned by the InterNIC or

service provider that represents one or more inside local IP addresses to the outside
world.

 Outside local address – The IP address of an outside host as it is known to the

hosts on the inside network.


 Outside global address – The IP address assigned to a host on the outside
network. The owner of the host assigns this address.

06/09/2025
1
NAT (NETWORK ADDRESS TRANSLATION)
Static NAT configuration

Static NAT configuration

06/09/2025
1
NAT (NETWORK ADDRESS TRANSLATION)

NAT configuration
06/09/2025
1
NAT (NETWORK ADDRESS TRANSLATION)
PAT configuration

 Inside Interface (LAN):


FastEthernet 0/0 →
192.168.1.1/24
 Outside Interface (Internet):
FastEthernet 0/1 →
203.0.113.1/24
 NAT Pool: 203.0.113.10 to
203.0.113.20

PAT configuration

06/09/2025
1
DEVICE MANAGEMENT PROTOCOLS
SNMP
NETCONF
 Widely used for monitoring and managing
network devices efficiently.  Enables configuration and state
 allows a network administrator to collect data management using XML over
about device performance, detect faults, and
secure transport.
configure remote devices.
 SNMPv3 is secure (uses authen & Author)

RESTCONF CLI (Command Line Interface)


 Provides RESTful API access to  Traditional and direct method for
configuration data on network device configuration and
devices. management.

06/09/2025
1
DEVICE MANAGEMENT PROTOCOLS
SNMP consists of 3 items/components

1. SNMP Manager (sometimes called Network Management System – NMS): a

software runs on the device of the network administrator (in most case, a
computer) to monitor the network.

 Collects and processes data from SNMP agents.

 Examples: SolarWinds, PRTG, Zabbix

2. SNMP Agent: a software runs on network devices that we want to monitor


(router, switch, server…)
 Runs on a network device (router, switch, server).

 Sends status updates and alerts to the SNMP Manager.

06/09/2025
2
DEVICE MANAGEMENT PROTOCOLS
3. Management Information Base (MIB): is the collection of managed objects.

 makes sure that the data exchange between the manager and the agent remains

structured.
 A database of device information (CPU usage, memory, interfaces).

 SNMP Manager queries the MIB to retrieve data.

06/09/2025
2
DEVICE MANAGEMENT PROTOCOLS
SNMP Messages(on SNMPv1)

 SNMP Messages are used to communicate between the SNMP Manager and Agents. SNMPv1

supports five basic SNMP messages:


 SNMP GET - sent by the SNMP Manager to retrieve information from the SNMP Agents

 SNMP GET-NEXT - retrieves the value of the next object in the MIB.

 SNMP GET-RESPONSE - used by the SNMP Agents to reply to GET and GET-NEXT messages.

 SNMP SET - used by the SNMP Manager to modify or assign the value to the SNMP Agents.

 SNMP TRAP

06/09/2025
2
DEVICE MANAGEMENT PROTOCOLS
SNMP Messages(on SNMPv2c)

 From SNMPv2c, two new messages were added: INFORM and GETBULK.

1. INFORM: An disadvantage of TRAP message is unreliable. SNMP communicates


via UDP so it is unreliable because when the SNMP Agents send TRAP message to
the SNMP Manager it cannot know if its messages arrive to the SNMP Manager. To
amend this problem, a new type of message, called INFORM, was introduced
from SNMPv2.

 If the sender never receives a response, the INFORM can be sent again

2. GETBULK: The GETBULK operation efficiently retrieve large blocks of data, such
as multiple rows in a table. GETBULK fills a response message with as much of the
requested data as will fit.

 Note: There is no new message types on SNMPv3 compared to SNMPv2c. 06/09/2025


2
DEVICE MANAGEMENT PROTOCOLS
Configuring SNMP

1. Configuring SNMPv2c (Community-Based)

 Router(config)# snmp-server community MY_COMMUNITY ro

2. Configuring SNMPv3 (Secure SNMP)

 Router(config)# snmp-server group SEC_GROUP v3 priv

 Router(config)# snmp-server user ADMIN_USER SEC_GROUP v3 auth md5 PASSWORD priv des 56

ENCRYPTION_KEY

3. Configuring SNMP Traps (Event Notifications)

 Router(config)# snmp-server enable traps

 Router(config)# snmp-server host 192.168.1.100 version 2c MY_COMMUNITY

Verifying SNMP Configuration

 Check SNMP settings - Router# show snmp

2
 Check SNMP users (for SNMPv3) - Router# show snmp user
06/09/2025
DEVICE MANAGEMENT PROTOCOLS
Syslog

 After completing all the configuration. Syslog alert us when something goes wrong or

down in your network.


 is a protocol used to collect, store, and analyze log messages from network devices
like routers, switches, and firewalls. It helps administrators monitor network events
and troubleshoot issues efficiently.
 Places to store and display syslog messages

Place to store syslog messages Command to use

Internal buffer (inside a switch or router) logging buffered [size]

Syslog server logging

Flash memory logging file flash:filename

Nonconsole terminal (VTY connection…) terminal monitor

Console line logging console


06/09/2025
2
DEVICE MANAGEMENT PROTOCOLS
Syslog configuration syntax

 Seq no: a sequence number only if the service sequence-numbers global

configuration command is configured

 Timestamp: Date and time of the message or event. This information appears only

if the service timestamps global configuration command is configured.

 FACILITY: This tells the protocol, module, or process that generated the message.

Some examples are SYS for the operating system, IF for an interface…

 SEVERITY: A number from 0 to 7 designating the importance of the action

reported.

06/09/2025
2
DEVICE MANAGEMENT PROTOCOLS
The Syslog levels are:

Level Keyword Description


0 emergencies System is unusable
1 alerts Immediate action is
needed
2 critical Critical conditions exist
3 errors Error conditions exist
4 warnings Warning conditions exist
5 notification Normal, but significant,
conditions exist
6 informational Informational messages
7 debugging Debugging messages

06/09/2025
2
DEVICE MANAGEMENT PROTOCOLS
Syslog Components

1. Syslog Client – The device that generates and sends log messages (routers,
switches, firewalls).
2. Syslog Server – The central server that collects and stores logs for analysis.
3. Syslog Messages – Log entries categorized by severity levels and facilities.

06/09/2025
2
QUALITY OF SERVICE (QOS)
Quality of Service (QoS)

 Is a set of technologies used to manage network traffic to improve performance

for critical applications.

 It helps ensure that important traffic (such as voice and video) gets higher

priority than less important traffic (such as file downloads)

Why is QoS Important?


 Reduces delay (latency) and jitter for real-time applications (VoIP, video calls).

 Prevents packet loss by prioritizing high-priority traffic.

 Efficient bandwidth utilization to avoid congestion.

 Improves user experience for business-critical applications.

06/09/2025
2
QUALITY OF SERVICE (QOS)
QoS Models

Best Effort (No QoS) Integrated Services Differentiated Services


 All traffic is treated (IntServ – RSVP) (DiffServ – DSCP)
equally (first-come, first-  Uses Resource  Most common QoS
served). Reservation Protocol model in modern
 No prioritization, can (RSVP) to reserve networks.
cause congestion for time- bandwidth.  Uses DSCP
sensitive applications.  Guarantees QoS per flow (Differentiated Services
but does not scale well Code Point) values to
for large networks. classify traffic.
 Allows for prioritization
without complex
reservations.

06/09/2025
3
QUALITY OF SERVICE (QOS)
Quality of Service Techniques

Classification Marking Queuing Policing & Shaping


 Identify traffic types  Label packets with  Manage packet  Control traffic rates
based on protocols DSCP or IP order to optimize by limiting bursts
or applications. precedence for delivery and reduce and smoothing
 Identifies different priority. delay. flows.
types of traffic  Assigns a DSCP  When bandwidth is  Policing – Limits
(VoIP, video, web). value to packets limited, QoS traffic to a certain
for priority handling queues packets to rate & drops
prioritize important excess packets.
traffic.  Shaping – Buffers

Expedited Forwarding (EF, DSCP 46) – Highest priority (VoIP). excess packets
Assured Forwarding (AF, DSCP 10–43) – Prioritized business instead of dropping
applications. them.
Best Effort (BE, DSCP 0) – Default traffic (email, web browsing) 06/09/2025
3
QUALITY OF SERVICE (QOS)
Traffic shaping and policing

06/09/2025
3

You might also like